website/docs/manifest_en.md

169 lines
11 KiB
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

4NK: A third way for a sovereign, frugal, and verifiable web
4NK: a web that is simpler, cheaper, more reliable, and sovereign.
Summary
Today, the internet faces a structural crisis. On one side, Web2 brought ease of use but rests on a centralized architecture that leaks data by default. Every interaction generates metadata captured and exploited by private platforms. This has led to an exploited internet, where users have lost control of their information. On the other side, States tried to react with fragmentation: sovereign clouds, national rules, national public blockchains. But that produces a balkanized network: closed, monitored, incompatible internets that do not restore trust.
Web3, supposed to be the alternative, failed. It tried to decentralize everything, creating new complexities: wallets, tokens, transaction fees, dependence on a few dominant blockchains. Web5, initiated by Jack Dorsey, had the right intuition: combine the simplicity of Web2 and the cryptographic resilience of Web3. But it remained limited by its reliance on Bitcoin as a forced, single monetary rail.
This is the context in which 4NK appears. 4NK is not a marketing layer nor yet another blockchain. It is a distributed, frugal, and verifiable infrastructure: a third way.
Our principles are clear:
- Neutral mesh relays: they control nothing, store nothing, surveil nothing. They only synchronize and replicate cryptographic proofs.
- User sovereignty: keys, data, identities remain exclusively under users control.
- Universal verifiability: every action is anchored and cryptographically traceable, without relying on a third party.
- Digital frugality: no heavy infrastructure, no foreign cloud, no extra CAPEX. Resilience comes from distribution, not energyhungry duplication.
Concretely, the experience stays identical to Web2: same simplicity, same fluidity. Under the hood, no structural leaks, no dependence on platforms or States. 4NK enables:
- securing messaging, documents, and any digital flow,
- immutable anchoring and timestamping of proofs,
- sovereign and portable digital identity,
- simpler payments and interactions,
- regulatory compliance without massive data exposure.
In short, 4NK breaks the cybersecurity glass ceiling. Where centralized infrastructures inevitably leak despite audits and certifications, 4NK makes leakage impossible by design. It is an infrastructure of resilience, where the user is sovereign, where trust rests on proofs, and where the internet regains its universality without being exploited or fragmented.
4NK, the third way: a sovereign, simple, frugal, and verifiable web.
Rollout plan
4NK deploys its technology in stages: first to regulated professions and critical sectors (notaries, logistics, health), then through isolated modules distributed by integrators and operators to reach SMEs and municipalities. By 20272030, the ambition is a European expansion based on a “noinfrastructure” distributed model, combining sovereignty, frugality, and accessible regulatory compliance for all digital services, everywhere, in open source.
An exploited and fragmented internet: between economic asymmetry and political partition
The original promise diverted
The internet was born from a clear ambition: connect heterogeneous networks to enable free and universal circulation of information. It was meant to be a neutral, inherently distributed space that encouraged scientific cooperation, communication between individuals, and ultimately social and economic innovation.
Thirty years on, that original project has been deeply altered. The global network is trapped in a double deadend: on one side, exploitation by private infrastructures that turn it into a tool for capture and surveillance; on the other, its progressive partition by States trying to fragment it to regain control. This dual movement has transformed the web into a structurally insecure space where the user has neither real control of their data nor any guarantee of neutrality.
Structural exploitation of Web2
Web2 relies on a clientserver architecture that places user data at the heart of centralized platforms. This brought unprecedented ease of use and accessibility. However, this convenience is inseparable from a design flaw: Web2 was made to leak data by default. Each interaction generates flows of information that produce a mass of invisible metadata. These traces reveal behaviors, profiles, and preferences and are exploited to fuel business models based on targeted advertising, algorithmic recommendation, and data resale.
Economic and societal consequences
- Company closures caused by massive leaks or cyberattacks
- Visible degradation of trust: daily lists of massive breaches
- Invisible industrial pillage of strategic data
- User experience complexity: multiple logins, passwords, heavy 2FA
- Revenue loss in payments: costly centralized rails
- Digital identity crisis
State fragmentation: the other deadend
Sovereign clouds, localization rules, “trusted” infrastructures produce a balkanized network: incompatible, closed, and surveilled internets that replace universality with archipelagos.
A structural double failure
- Web2 yields an exploited internet where value is captured by private infrastructures
- State attempts produce dystopian, fragmented internet
Identity as the keystone of sovereign uses
Identity has become the keystone of all uses: login, sign, pay, access services, exchange data. Without robust, usercontrolled identity, no digital sovereignty is possible.
Current limits and contradictions
- Centralized identity registries inevitably leak
- Surveillance mechanisms are invasive and inefficient
- Expanding ageverification builds highly sensitive databases of childrens identities
A rising systemic cost: insecurity, dependence, fragile infrastructures
- Business bankruptcies caused by compromise
- Invisible pillage of intellectual property
- Compliance and security cost inflation without added value
- Citizens: distrust, cognitive overload, digital exclusion
- States: balkanization and illusory sovereignty
The vicious circle: more leaks → less trust → more defensive layers → more complexity and costs → leaks continue
4NK as a way out: change the infrastructure itself
- For businesses: make structural leakage impossible
- For citizens: Web2like simplicity with sovereign identity and data
- For States: an alternative to fragmentation with a neutral distributed infrastructure
Why Web3 failed (and what to keep)
- You cannot put everything on a blockchain; not everything benefits from decentralization
- Gas fees create economic friction; UX becomes complex
- Recentralization around a few dominant chains and custodial intermediaries
- Decentralization is a means, not an end. The end is resilience
Web5 and Solid taught valuable lessons but were constrained by governance, politics, or an overly narrow strategic alignment. 4NK learns from these paths while avoiding their limits.
4NK: sovereign, simple, verifiable infrastructure
Architectural principles:
- Neutral mesh relays that control nothing and only synchronize proofs
- Sovereign users: keys remain exclusively with users
- Universal verifiability: every action is anchored and traceable
- Frugal by design: no extra CAPEX, no foreign clouds
User experience: continuity of Web2
- Keep UX identical to Web2 while making the infrastructure invisible
Security and verifiability
- Endtoend encryption, distributed anchoring, no metadata leakage by design, universal traceability
A resilience infrastructure
- Remove single points of failure; services continue even as some nodes disappear
The “third way” in practice
- Keep Web2 simplicity, remove data leakage
- Keep Web3s cryptographic verifiability, reject “decentralize everything”
- Mesh relay architecture without private capture or state control
Breaking the glass ceiling
Centralization concentrates data, expands attack surface, and forces endless defensive layers. 4NK replaces declared trust with provable trust and eliminates structural leakage by design while maintaining simplicity and frugality.
Economy of verifiable trust
- Web2: infrastructure turned into financial product (rents)
- Web3: tokencentric, VCdominated blockchains
- State projects: costly, controlled, weakly adopted
- 4NK: neutral common infrastructure, no CAPEX clientside, no token rent, no state control, proofs by design
Energy sobriety
- Reuse existing equipment; no industrial duplication
- Use Bitcoin as a shared anchoring layer: one transaction can certify billions of anchors via Merkle aggregation; cost does not scale with usage
Operational implementation
Zones:
- User zone (browser/client)
- Relay zone (mesh)
- Distributed application zone
- Bitcoin anchoring zone
Relays: synchronize anchors, provide redundancy, remain blind by design
Sovereign identities
- Derivation peruse (inspired by silent payments) → unlinkability
- Verifiable yet confidential credentials
Anchoring on Bitcoin
- One Bitcoin transaction as cryptographic root for entire data trees → global security without peruse energy inflation
Security and isolation
- Minimal exposure (reverse proxy), isolated critical services, systematic encryption
Distributed governance
- Any organization/user can run nodes; no single actor can impose decisions
Deployment strategy (progressive migration)
1) Sovereign document management (Docv)
2) Encrypted messaging and sovereign communications
3) Distributed, probative traceability across value chains
4) Innovative identity and login methods (passwordless, derived addresses)
5) Integrated, decentralized payments (micropayments, P2P, Bitcoinanchored)
Macroeconomic and societal impacts
- Industrial competitiveness: end of data pillage, predictable security costs, local value capture
- Jobs and ecosystem: local integration and support, diversified operators, European independence
- Restoring trust: verifiable identity, no massive registries, proofs without overexposure
- Ecological sobriety: minimal marginal energy through distribution and shared Bitcoin anchoring
Risks and limits
- Maturity and adoption thresholds
- Responsibility shift to users for key management (needs education)
- Regulatory interoperability (dialogue to avoid forced centralization)
- Indirect dependence on Bitcoins resilience
- Resistance from entrenched actors
Conclusion
Migrating to a distributed, neutral, and verifiable infrastructure is not a secondary technical option: it is a rational societal choice. 4NK offers an infrastructure where security is a property of the architecture itself—provable, sovereign, frugal—making the internet simpler, cheaper, and more trustworthy.